{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:26:32Z","timestamp":1762298792736},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/comsnets.2018.8328178","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T20:45:17Z","timestamp":1522701917000},"page":"41-48","source":"Crossref","is-referenced-by-count":2,"title":["Opportunistic MAC protocol for co-existence of M2M and Wi-Fi network"],"prefix":"10.1109","author":[{"given":"Ajinkya","family":"Rajandekar","sequence":"first","affiliation":[]},{"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(03)00067-1"},{"key":"ref11","first-page":"768","article-title":"Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system","author":"cha","year":"2006","journal-title":"Proc IEEE CCNC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095854"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/1427464"},{"journal-title":"Structured Stochastic Matrices of M\/G\/1 Type and Their Applications","year":"1989","author":"neuts","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2310425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2323311"},{"key":"ref4","first-page":"110","article-title":"AP-Assisted CTS blocking for WiFi-ZigBee Coexistance","author":"ishida","year":"2015","journal-title":"Proc IEEE ISCN"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.BODYNETS2009.6029"},{"key":"ref6","first-page":"14","article-title":"Protecting wireless networks against a denial of service attack based on virtual jamming","author":"chen","year":"2003","journal-title":"Proc ACM MobiCom"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1160987.1161002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0013859"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2394438"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2482973"},{"key":"ref1","article-title":"Wi-Fi networks are underutilized","author":"raghavendra","year":"2009","journal-title":"MSR Technical Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2613536"}],"event":{"name":"2018 10th International Conference on Communication Systems & Networks (COMSNETS)","start":{"date-parts":[[2018,1,3]]},"location":"Bengaluru","end":{"date-parts":[[2018,1,7]]}},"container-title":["2018 10th International Conference on Communication Systems &amp; Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8325363\/8328170\/08328178.pdf?arnumber=8328178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:36:33Z","timestamp":1643175393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2018.8328178","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}